Beijing, March 22 (IANS) A suspected hacker in China, accused of leaking personal information of more than six million internet users, has been arrested. Zeng, detained on charges of illegal acquisition of computer data, committed the crimes in December. He was nabbed in Zhejiang province. The leak is considered the…
SXSW panel sparks over Big Data privacy concerns even without Google, Facebook
A Sunday afternoon panel designed to address head-on privacy concerns stemming from so-called “big data” collection sparked passions even though both Facebook and Google, whose privacy practices draw most consternation from critics, declined to participate, leaving no one to take the side of industry. Moderator Molly Wood, the executive director…
How to ensure data security by spotting enterprise security weaknesses
How can a specialized organization spot security weaknesses? Nick Lewis offers a process to help niche companies ensure data security. View full post on SearchSecurity: Threat Monitor View full post on National Cyber Security
Can Big Data be used to catch network invaders?
The buzz in security circles about “Big Data” goes something like this: If the enterprise could only unite its security-related event data with a warehouse of business information, it could analyse this Big Data to catch intruders trying to steal sensitive information. This is the security angle to the Big…
Is Facebook preventing critics from downloading their account data?
Do you want to leave Facebook? Some departing users are claiming that the social network simply doesn’t want to say goodbye to their data.. View full post on Naked Security – Sophos View full post on National Cyber Security
Three Low-Cost Ways to Keep Data Safe When Traveling for Business
Technology can make business trips easier, but it can also create new risks you need to address. View full post on firefox hacker – Yahoo! News Search Results View full post on National Cyber Security
Verizon claims most data breaches undiscovered for months or years
Over 90 percent of data breaches are the result of external attacks and almost 60 percent of organisations discovered them months or years later, Verizon claimed at the RSA security conference. Called the Verizon 2011 Investigative Response Caseload Review, it compiles statistics from 90 data breach cases investigated by the…
Malware Analysis Software mines data and assesses threats.
Evaluate Norman Malware Analyzer G2 at the RSA Conference 2012, Booth 2345 FAIRFAX, Va., — Norman, a global security leader who delivers powerful malware analysis solutions for enterprise, service providers and government, announced the availability of the latest version of its Malware Analyzer G2 platform. This next generation malware analyzer…
Microsoft warns hackers may have customer credit card data
Microsoft has warned customers that their financial data such as credit card information may have been compromised by hackers who attacked the company’s online store in India earlier this month. The company had earlier described the hack, in which user names and passwords had been leaked, as a “limited compromise”….
ProtectMyID: #Truesday: Business data breaches result in more exposed records than any other type of data breach. T or F?
ProtectMyID: #Truesday: Business data breaches result in more exposed records than any other type of data breach. T or F? View full post on Twitter / ProtectMyID View full post on National Cyber Security